Wiper malware has been detected abusing legitimate drivers and targeting Active Directory servers amid ongoing Russian military conflict in Ukraine. The campaign reflects a growing trend of malware use during geopolitical crises with organizations urged to mitigate risks.
Discovered by ESET researchers on February 23, the malware, named HermeticWiper, has been installed on hundreds of machines in the country and indicates that there is no longer a distinction between cybersecurity and international security during crises. This follows recent DDoS attacks against several Ukrainian websites, the deployment of an EU cyber rapid-response team committed to helping defend Ukraine from cyberattacks, and warnings of potential ransomware attacks against US organizations in the wake of new sanctions placed on Russian banks and elites by President Biden.
More Stories
SecurityScorecard Observes Surge in Third-Party Breaches
In its 2025 Global Third-Party Breach Report, SecurityScorecard has found that 35.5% of all cyber breaches in 2024 were third-party...
Threat Actors Abuse Trust in Cloud Collaboration Platforms
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials Read More
Malicious npm Packages Deliver Sophisticated Reverse Shells
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments Read More
ETSI Publishes New Quantum-Safe Encryption Standards
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption Read More
AI Data Poisoning
Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI...
ENISA Probes Space Threat Landscape in New Report
EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector Read...